Security Management:
Identity Access Management

ConnectID – Single Sign On

No More Searching for Passwords...

Users authenticate once and are presented with a portal page showing the apps and sites that they’re entitled to access.

Users have the freedom to work anytime, anywhere and from any device, without being repeatedly challenged for an ever increasing number of credentials. This enterprise level Identity Access Management (IAM) service comes with an integrated self-service password reset workflow, dramatically reducing the cost of password related calls to helpdesks.

ConnectID SSO supports all major browsers—including Internet Explorer, Chrome, Firefox and Safari—as well as apps for both iOS and Android.

Integrates with AD (and other LDAP directories) allowing organizations to leverage their existing IAM investments and extend them to any web application whether internal or external. Users are granted access to their landing or portal page based on their current Windows session and will never need to enter any credentials after signing into their desktop as normal.

Multi-factor Authentication

Supports the full range of strong two-factor authentication solutions to protect access to sensitive applications for all or a subset of users.

Application and User Enrollment

New applications can be added in less than a minute with the easy-to-use the Application Admin wizard.

Using the comprehensive built-in enrollment features it is possible to deploy across hundreds or thousands of users, and multiple applications, within hours rather than weeks. Implementation is light touch on IT teams and intuitive for users—no lengthy training is required. A simple email, with a short ‘How To’ guide or video is all that’s needed.

ConnectID – App Shaping

Manage User Access to Any Page, Tab, Link, Button or Menu Option.

App Shaping offers on-premises-equivalent access control to any web application, without lengthy and expensive customization.

IT Admin can manage user access without modifying the application backend in any way. Specific user actions can be monitored and logged with the option to capture screen shots, or access to any element within an application can be restricted.

Application features and functions that give users the potential to misuse and abuse applications and associated data can be disabled, or removed from the page entirely.

Browser Functions

You can also control which browser functions are available when using a particular application. Menu items such as Copy and Print can be disabled when viewing sensitive reports, for example, in addition to preventing extracts of data using in-built export features within applications. By controlling not only application functionality but also browser activity the ability to misuse and abuse applications is further reduced.

Masking Sensitive Data

Mask or redact sensitive or regulated data—including personally identifiable information—that would ordinarily be visible in the browser window based on user role. This masking feature can be used with any web application, including legacy applications, avoiding costly development or replacement.

Application features and functions that give users the potential to misuse and abuse applications and associated data can be disabled, or removed from the page entirely.

For example...

– Make social media sites read-only when accessed from company-provided devices.

– Allow the use of web mail but perhaps remove the ability to attach files to messages.

– Adopt cloud-based productivity applications without the ability to save copies of documents and spreadsheets locally to any device.

ConnectID – Audit & Compliance

Total Visibility of All User Activity

ConnectID Enterprise providies a detailed audit trail of all user interaction with applications—from login to logout, and everything in between.

VISUAL EVIDENCE: The use of specific features within applications can be monitored—with the option to capture screen shots for particular actions—enabling the organization to provide visual evidence of exactly what the user did or didn’t see.

USER SPECIFIC AUDIT TRAIL: Access to the audit trail on Info Exchange Cloud is controlled through role-based access to ConnectID Enterprise. The audit trail can be easily searched to find specific information relating to a user, application, or application feature.

EASY MANAGEMENT: A full management dashboard is provided giving summary views of all user-application interaction, and where unusual or suspicious activity is immediately highlighted enabling exceptions to be handled quickly.

Uniquely placed within the browser between the user and the applications they access, ConnectID Enterprise provides total visibility of all user activity within any web application—including Single Page Interface (SPI) applications where user interaction may not result in a change in URL or communication with the application server.

ConnectID is uniquely flexible and can be formatted to meet your audit needs. Auditing levels can be configured for both individual applications as well as groups of users. You decide whether you want to capture just login and logout events or every page load. Plus, auditing can be limited to only applications under management or extended to all browser activity across managed and unmanaged applications and sites.

Need Support?

Subscribe to our Blog

&nbsp

"Funding provided by the 10th EDF Regional Private Sector Development Programme
Direct Assistance Grant Scheme. The view expressed are those of the author(s) and do
not reflect those of the Direct Assistance Grant Scheme."